Blog Posts Tagged with "Backups"

5e402abc3fedaf8927900f014ccc031f

Do you have a PERSONAL disaster recovery plan?

November 01, 2012 Added by:Allan Pratt, MBA

Most companies, especially publicly-held companies with complex regulations to follow, have disaster recovery plans. They include instructions for data back-up, storage, and recovery as well as employee training. However, with all this talk about corporate planning, do you have a PERSONAL disaster recovery plan?

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Day I Was Erased Digitally

August 17, 2012 Added by:Theresa Payton

It’s everyone’s worst night nightmare - everything digital in your life gets wiped out. Your phone, your computer, your tablet, every email address, social network profile. It really does happen, and most of you probably didn’t know that even techies and security experts worry about this happening to them...

Comments  (0)

942fc2242e6b54c078c5bb19c9fbf154

Five Security Tips for Android Phones and Tablets

July 31, 2012 Added by:Nicholas Cifranic

Android app stores such as Google Play have little or no security implementation, so anyone with a developer account may publish applications. Although Google has been attempting to enforce more controls to detect malicious apps, hackers are still publishing malware disguised as popular applications...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Save Your Photos from a BYOD Security Policy

June 24, 2012 Added by:Brent Huston

One of the more common rules is to enable the remote wipe and lock feature. This means that if your device was ever stolen or compromised, the IT department can remotely lock the device and then wipe any data from it. And yes, that would include all of your photos as well as other items...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Making Sense of Data Storage in the Cloud

June 11, 2012 Added by:Theresa Payton

How should you protect your precious digital files? The good news is there are many services to choose from. Here is just a short list to review so you can pick what is best for you based on storage options, privacy and security features, and budget...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Ensuring Data Integrity via Checks, Tests, and Best Practices

June 04, 2012 Added by:Fergal Glynn

As a process, data integrity verifies that data has remained unaltered in transit. As a state or condition, it is a measure of the validity and fidelity of a data object. As a function related to security, means information is exactly as it was inputted and is auditable to affirm its reliability...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Your New Best Friend May Not Protect You

May 05, 2012 Added by:Robert Siciliano

Your mobile phone may be your new best friend. Four out of seven people have mobile phones, because a phone really is a great companion that brings us into contact with people, media, music, and finances. But unlike a German Shepherd, your mobile isn’t a security device...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Data Back-Up Strategies for Your Business

March 25, 2012 Added by:Robert Siciliano

Do you backup data? One of the problems with getting a small businesses to secure data is they think they need to load up thumbdrives, DVDs or tape devices manually. This is in fact tedious and overwhelming. I’ve got news for you, data backup is easy...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

March 06, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

A88973e7d0943d295c99820ab9aeed27

Data at Rest: Dormant But Dangerous

February 10, 2012 Added by:Simon Heron

Data is considered to be either ‘at rest’, ‘in transit’ or ‘in use.’ When putting security measures in place, it is important to consider all three states and address risks associated with each. This article examines data at rest and proposes strategies to minimize dangers...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

February 07, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

IC3: Recovery from the Malicious Erasure of Files

January 23, 2012 Added by:Headlines

Cyber criminals can damage a victim's computer by changing or deleting files, wiping hard drives, or erasing backups to hide some or all of their malicious activity and tradecraft. The FBI and DHS encourage businesses and individuals to employ these mitigation strategies...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

A Checklist for Customer Cloud Security

December 06, 2011 Added by:Ben Kepes

In our cloud security whitepaper we spent time talking about why Cloud Computing is potentially more secure than traditional models of IT delivery while at the same time pointing out the fact that there’s still security issues that organizations need to think about when using Cloud...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Small Business Slow to Adopt Data Backup Systems

September 29, 2011 Added by:Headlines

"Business owners will need to understand what the cloud is and what it can do for their businesses in the areas of cost control, data security, data protection, accessibility, efficiency and productivity to facilitate a smooth running technological platform for their business..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

On Data Retention – When Not to Backup Data

May 24, 2011 Added by:Danny Lieberman

How much damage would be incurred if there was breach? For the purpose of asset valuation, we distinguish between customer data without PII and customer data that may have PII. Let’s consider 4 key assets of a company that designs and manufactures widgets and sells them over the Internet...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Back Up Your Backup, Then Back It Up Again

May 13, 2011 Added by:Robert Siciliano

If you aren’t in the habit of backing up your data, you might assume it’s difficult or tedious. But I’ve got news for you, it’s easy-peasy. Backing up is a complete no-brainer. There are many backup options. New PCs often come bundled with backup options included in the “bloat ware"...

Comments  (5)

Page « < 1 - 2 > »